indetectables-net / teorias-numeradasLinks
Mirror de las teorias numeradas del sitio de Narvaja
☆24Updated 7 months ago
Alternatives and similar repositories for teorias-numeradas
Users that are interested in teorias-numeradas are comparing it to the libraries listed below
Sorting:
- Conjunto de manuales para reversa/analisis/cracking☆67Updated 3 years ago
- 「🛡️」AVs/EDRs Evasion tool☆103Updated last year
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆271Updated 2 years ago
- CobaltStrike 4.8 Cracked☆66Updated 2 years ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆293Updated 9 months ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆379Updated 2 years ago
- Golang tool to help in forcing a license for HAK5 C2 Tool☆54Updated 2 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- ObfuXtreme is an advanced Python obfuscation tool for security research, reverse engineering education, and analysis of how obfuscation i…☆193Updated 3 weeks ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆397Updated 2 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆96Updated 3 years ago
- A Linux persistence tool!☆160Updated 4 months ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆176Updated 3 years ago
- Go shellcode loader that combines multiple evasion techniques☆387Updated 2 years ago
- ☆168Updated 2 years ago
- Notes, red team materials, testing tools, etc.☆153Updated last year
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆109Updated 5 years ago
- ☆333Updated 2 years ago
- A keygen for Specter Insight C2☆41Updated 11 months ago
- Exploit for CVE-2025-11001 or CVE-2025-11002☆147Updated 2 months ago
- Bypass Malware Sandbox Evasion Ram check☆141Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆279Updated 4 years ago
- Extract C2 Traffic☆252Updated last year
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆281Updated 11 months ago
- ☆108Updated 3 years ago
- Repo for malware development practices I post on my blog☆35Updated last year
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated 2 years ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆127Updated 2 years ago
- CHAOS RAT web panel path RCE PoC☆30Updated last year
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆446Updated 2 years ago